Information Technology Specialist Government - McLean, VA at Geebo

Information Technology Specialist

Under the direction of the CISO, operates controls to assure that all computer systems and applications are in compliance with Federal security standards and laws. Assures that reporting requirements are completed in a timely manner. As an Information Technology Specialist, your specific duties include:
Developing and providing training to staff and Agency management regarding the Agency's Information Security Program. Coordinating with the CISO to establish security policies, procedures and standards for Agency enterprise IT computing environment. Reviewing and updating as needed. Performing ongoing security analysis on all computer operations, using automated tools when available to assure that all systems incorporate Agency security policies and any problems are identified. Performing research, analysis and testing to identify and integrate products that enhance security of FCA computing network and/or promote efficiency in maintaining the security of the computing environment. Participating with technology managers in OIT in tracking progress on computer initiatives and internal and external reporting requirements are met. Applying guidance from current applicable Federal laws and standards regarding information security to assure FCA is in compliance. Provides analysis of proposed changes to the FCA computing environment based on new standards and laws. You may qualify at the VH-38 (GS-12) band level if you have one year of specialized experience equivalent to the VH-37 (GS-11) grade level in the Federal service gained in either the public or private sector. Specialized experience for this position requires meeting all five parts of the following:
Experience interpreting security related, laws, Federal mandates and guidance and applying to the enterprise environment Knowledge of Federal Information Security Modernization Act (FISMA), Federal Risk and Authorization Management Program (FedRAMP) and National Institute of Standards and Technology (NIST) guidance; Experience formulating and articulating security recommendations and requirements as part of the change control and authorization process; Experience preparing security documentation including security plans, authorization packages, policies, and procedures; and Experience coordinating security related projects and reporting efforts including FISMA. NOTE:
In order to be qualified your resume must demonstrate that you meet the basic requirement and all four parts of the specialized experience statement. AND In order to be deemed qualified you must meet the basic requirement and specialized experience statement as outlined below.The basic requirement for this Information Technology (Privacy) position is Information Technology-related experience demonstrating each of the four competencies listed below:
Attention to Detail - Is thorough when performing work and conscientious about attending to detail. Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; and, is committed to providing quality products and services. Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately. Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. This experience must be Information Technology-related; the experience may be demonstrated by paid or unpaid experience and/or completion of specific, intensive training (for example, IT certification), as appropriate. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community, student, social). Volunteer work helps build critical competencies, knowledge, and skills and can provide valuable training and experience that translates directly to paid employment. You will receive credit for all qualifying experience, including volunteer experience. You must meet all qualification requirements and submit all required supporting documentation by the closing date of this announcement. If you are found to be among the most highly qualified candidates you will be referred to the hiring manager for further consideration and possible interview. Time-In-Grade Requirements:
Current and former Federal employees (including VEOA eligibles) must have served one-year (52 weeks) at the next lower grade in the Federal service to meet time-in-grade restrictions per 5 CFR 300, Subpart F, by the closing date of the announcement. Time after Competitive Appointment:
Current Federal employees must meet time after competitive appointment requirements per 5 CFR 330, Subpart E, by the closing date of the announcement.
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $94,016 to $155,126 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.